Buried By The Authentication Avalanche

PINs, passwords, PKI, and more... everyone agrees authentication needs to be improved, and everyone and their uncle has a solution. Which way to go in the fractionalized authentication market?

By Jacqueline Emigh | Posted Dec 13, 2002
Page of   |  Back to Page 1
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

With identity theft on the rampage, network managers are being hit by an increasing barrage of software, hardware and services for user authentication. Organizations are implementing technologies ranging from traditional passwords/PINs to PKI and SSL certificates, tokens, fingerprint readers, and even voiceprints. Each solution carries its own infrastructure, along with its own technical ins-and-outs.

Observers agree that the authentication market is highly fractionalized. "Everybody and his brother is getting into authentication," contended Steven Hunt, VP of Research at Giga Information Group.

"Companies are recognizing that these products are using multiple and overlapping infrastructures. Passwords, for instance, have a whole help desk infrastructure behind them. The entire thing can be very confusing for administrators. The pressure is on for vendors to come up with a single shared process for authentication," he added

"Everyone has been thinking they can do authentication is a slightly better way. The market is still very, very immature," concurred Scott Blake, president of information security at BindView Corporation.

A recent report from IDC characterized the hardware authentication market, at least, as "a loose confederation of clones."

"Although similar technologies are being used among token, smart card, and biometrics vendors, the applications for which they are being used vary dramatically depending on the type of market, whether for commercial/corporate or government markets. The overall hardware authentication market remains highly fragmented, with many applications," summed up the IDC analysts.

In fact, the market is so fractionalized that the analysts decided against apples-to-apples comparison. "For this report, IDC has placed such vendors into markets according to their lowest common denominator technologies. However, comparisons among vendors within each of these submarkets, especially for biometrics, cannot be directly made."

Attempts are being made, though, to categorize the market. "Multifactor authentication is best to use, combining 'something you know' with 'something you are' and 'something you have,'" pointed out Andrew R. Rolfe, VP of development at Authentify.

As Rolfe sees it, user identify should be proven through "first-time" as well as "recurring" authentication solutions. Recurring authentication solutions include user ID with password/PIN; digital certificates; tokens; and biometric solutions.

"First-time" solutions include in-person proofing; sending out PINs via snailmail; data comparison information; (when the user supplies social security number or mother's maiden name, for example, for later comparison); and e-mail activation (when the user must respond to an e-mail in order to finish opening an account.).

PINs can enter the scene again during transactions. Notifications either by e-mail, fax, or snailmail can come into play at that point, too.

More and more, applications are coming with their own built-in authentication mechanisms. This, in fact, sometimes gives administrators no choice over what types of authentication to use, observed Patrick Hinojosa, CTO at Panda Software.

Meanwhile, products available for separate purchase range from PKI management packages to smart card readers, and beyond.

Ironically, though, despite the plethora of products and services, authentication remains a glaring security gap at many organizations, according to industry statistics. On the FBI's most recent list of "top 20 most critical Internet security vulnerabilities," the following problem landed in seventh place for Microsoft Windows security: "General Windows Authentication Accounts with No Passwords or Weak Passwords."

Similarly, on the Unix side of the house, vulnerability number ten was as follows: "General Unix Authentication Accounts with No Passwords or Weak Passwords."

To get better security, while avoiding costs associated with integration, some systems administrators are turning to outsourcing. Practitioners of "managed authentication services" range from Authentify, a specialist in voice verification, to AT&T, now a purveyor of token authentication services.

Authentify is now delivering voice verification services to 15 customers, including Hewlett-Packard and the US Social Security Administration, according to Rolfe. Authentify's services range from password reset via voicemail to voiceprint verification, for instance.

In terms of achieving a broader overall authentication framework, Hunt sees a few bright lights ahead. "Novell, iPlanet, and Entrust all seem to be moving toward consolidation. Microsoft also has a vision for authentication. I'd like to give Microsoft the benefit of the doubt. When they focus on an issue, they do seem to come up with a solution eventually," he maintained.

Smart cards may hold promise, too, according to Hunt. "Smart cards have already been used for physical access to buildings. They fit in well with our whole plastic card- carrying culture."

When administrators do have a choice over which kinds of authentication to use, Rolfe suggests using a risk management approach, balancing the strength of the authentication solution against the costs and other drawbacks involved.


» See All Articles by Columnist Jacqueline Emigh


Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter